
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>critical infrastructure Archives - Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<atom:link href="https://www.icscybersecurityconference.com/tag/critical-infrastructure/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.icscybersecurityconference.com/tag/critical-infrastructure/</link>
	<description>ICS Cybersecurity Conference - Industrial/SCADA Cybersecurity</description>
	<lastBuildDate>Wed, 30 Oct 2024 01:53:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.icscybersecurityconference.com/wp-content/uploads/2016/09/favicon.png</url>
	<title>critical infrastructure Archives - Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<link>https://www.icscybersecurityconference.com/tag/critical-infrastructure/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Deep Dive: PIPEDREAM/Incontroller ICS Attack Framework</title>
		<link>https://www.icscybersecurityconference.com/deep-dive-pipedream-incontroller-ics-attack-framework/</link>
					<comments>https://www.icscybersecurityconference.com/deep-dive-pipedream-incontroller-ics-attack-framework/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Sat, 10 Dec 2022 16:01:23 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[video]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=19359</guid>

					<description><![CDATA[<p>In this session, Mark Plemmons, Sr. Director for Threat Intelligence at Dragos, dives deep into the technical details and real-world impact on the modular ICS attack framework known as PIPEDREAM/Incontroller</p>
<p>The post <a href="https://www.icscybersecurityconference.com/deep-dive-pipedream-incontroller-ics-attack-framework/">Deep Dive: PIPEDREAM/Incontroller ICS Attack Framework</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/deep-dive-pipedream-incontroller-ics-attack-framework/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Intelligence Gathering on U.S. Critical Infrastructure</title>
		<link>https://www.icscybersecurityconference.com/intelligence-gathering-on-u-s-critical-infrastructure/</link>
					<comments>https://www.icscybersecurityconference.com/intelligence-gathering-on-u-s-critical-infrastructure/#respond</comments>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Thu, 10 Oct 2019 15:04:35 +0000</pubDate>
				<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[exposed]]></category>
		<category><![CDATA[facilities]]></category>
		<category><![CDATA[industrial]]></category>
		<category><![CDATA[intelligence]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[scanning]]></category>
		<category><![CDATA[shodan]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=3027</guid>

					<description><![CDATA[<p>How Open Source Intelligence can be applied to reconnaissance on critical infrastructure. In many cases it’s possible to narrow a search to specific buildings like power plants, wastewater plants, or chemical and manufactured facilities. The research consists of 26,000 exposed devices in United States.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/intelligence-gathering-on-u-s-critical-infrastructure/">Intelligence Gathering on U.S. Critical Infrastructure</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/intelligence-gathering-on-u-s-critical-infrastructure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>GCHQ Warns of State-sponsored Hackers Targeting Critical Infrastructure</title>
		<link>https://www.icscybersecurityconference.com/gchq-warns-state-sponsored-hackers-targeting-critical-infrastructure/</link>
					<comments>https://www.icscybersecurityconference.com/gchq-warns-state-sponsored-hackers-targeting-critical-infrastructure/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Tue, 18 Jul 2017 21:10:20 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[GCHQ]]></category>
		<category><![CDATA[ICS]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1487</guid>

					<description><![CDATA[<p>By Kevin Townsend (SecurityWeek) The U.K. Government Communications Headquarters (GCHQ), Britain&#8217;s secret eavesdropping agency, warns that &#8216;a number of [UK] Industrial Control System engineering and services organisations are likely to have been compromised&#8217; following the discovery of &#8216;connections from multiple UK IP addresses to infrastructure associated with advanced state-sponsored hostile threat actors.&#8217; The warning comes from a National Cyber Security Centre (NCSC) memo obtained by Motherboard and confirmed by the BBC. NCSC is part of the UK&#8217;s primary cyber intelligence agency, GCHQ. From the little [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/gchq-warns-state-sponsored-hackers-targeting-critical-infrastructure/">GCHQ Warns of State-sponsored Hackers Targeting Critical Infrastructure</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/gchq-warns-state-sponsored-hackers-targeting-critical-infrastructure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How Vulnerable are Our Industrial Control Systems? What We Learned From ICS Attacks of 2016</title>
		<link>https://www.icscybersecurityconference.com/ust-vulnerable-industrial-control-systems-learned-ics-attacks-2016/</link>
					<comments>https://www.icscybersecurityconference.com/ust-vulnerable-industrial-control-systems-learned-ics-attacks-2016/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Thu, 09 Mar 2017 18:38:18 +0000</pubDate>
				<category><![CDATA[ICS]]></category>
		<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[Kemuri Water Company]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1456</guid>

					<description><![CDATA[<p>Multiple cyberattacks on critical infrastructure facilities in 2016 resulted in mere inconvenience or embarrassment. How long can dumb luck keep us from harm? By Michael Shalyt, VP Product, APERIO Systems When the U.S. Energy Department released a nearly 500 page report this month warning of an “imminent” threat to the electrical grid, it was the latest reminder of just how dependent our day-to-day existence is on critical infrastructure networks — from power grids and water supplies to transportation networks and more. In 2016, [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/ust-vulnerable-industrial-control-systems-learned-ics-attacks-2016/">How Vulnerable are Our Industrial Control Systems? What We Learned From ICS Attacks of 2016</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/ust-vulnerable-industrial-control-systems-learned-ics-attacks-2016/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
